CN106937406A - A kind of method and system for accessing wireless network - Google Patents
A kind of method and system for accessing wireless network Download PDFInfo
- Publication number
- CN106937406A CN106937406A CN201710221072.2A CN201710221072A CN106937406A CN 106937406 A CN106937406 A CN 106937406A CN 201710221072 A CN201710221072 A CN 201710221072A CN 106937406 A CN106937406 A CN 106937406A
- Authority
- CN
- China
- Prior art keywords
- node device
- controller
- temporary key
- wireless network
- verification value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a kind of method and system for accessing wireless network, wherein, the method for accessing wireless network carries out pairing feature and exchanges by controller and node device;Prompting user is input into the temporary key produced by the on-off times of control node equipment on the controller;The temporary key according to user input carries out matching checking afterwards, and generates ephemeral keys according to the temporary key after being proved to be successful;The encryption connection set up between controller and node device according to the ephemeral keys afterwards, complete encryption data interaction, temporary key is produced by the on-off times of control node equipment, the production costs such as Quick Response Code or bar code need not be increased, and temporary key randomness is strong, effectively increase the security of data interaction between smart machine in wireless network.
Description
Technical field
The present invention relates to radio network technique field, more particularly to a kind of method and system for accessing wireless network.
Background technology
In the wireless network during the pairing of equipment, when the temporary key of foreseeable or easy determination(TK)Value is made
Used time, no matching method provides protection in order to avoid being eavesdropped during pairing.In traditional technical scheme, typically
In process of production for smart machine distributes unique temporary key or identical temporary key, and it is stored in smart machine;
After user buys the product, the key is got, and this key is input in controller is matched, after successful matching,
Can make to set up safety chain between smart machine and controller, that is to say, that after completing matching operation using temporary key, intelligence
Arrange long term keys between equipment and controller, the data for communicating are encrypted using long term keys.
Because most of wireless smart devices do not have man-machine interface and OOB(Out Of Band), user will obtain temporarily
Key can only be by way of Quick Response Code or bar code on product packing box, and this directly increases the complexity of production process
And production cost, and easily cause temporary key loss and easily obtained by third party, cause Network Security Vulnerabilities.
Thus prior art could be improved and improve.
The content of the invention
In view of above-mentioned the deficiencies in the prior art part, it is an object of the invention to provide a kind of method for accessing wireless network
And system, temporary key is produced by the on-off times of control node equipment, it is produced into without increasing Quick Response Code or bar code etc.
This, and temporary key randomness is strong, effectively increase the security of data interaction between smart machine in wireless network.
In order to achieve the above object, this invention takes following technical scheme:
A kind of method for accessing wireless network, it comprises the following steps:
A, controller carry out pairing feature and exchange with node device;
B, prompting user are input into the temporary key produced by the on-off times of control node equipment on the controller;
C, matching checking is carried out according to the temporary key of user input, and generated according to the temporary key after being proved to be successful short
Phase key;
D, the encryption connection set up between controller and node device according to the ephemeral keys, complete encryption data interaction.
In the method for described access wireless network, before the step A, or after the step A, before step B
Also include step:
Continuously switch several times, is detected and remembered in Preset Time according to the switching control instruction of user input for A0, node device
The frequency n of switching manipulation is recorded, the frequency n is saved as into temporary key.
In the method for described access wireless network, the step A0 comprises the following steps:
A01, the power switch of node device are continuously switched several times in Preset Time;
A02, energy-storage module are powered when power switch is closed to node device;
A03, the switching-on and switching-off state of switch detection module detection node equipment simultaneously export corresponding level;
A04, the electrical level judging according to output simultaneously record the frequency n of switching manipulation, and the frequency n is saved as into temporary key.
In the method for described access wireless network, the step A04 is specifically included:
When the low level duration is exported more than very first time threshold value, judge that power switch is closed;When first
Output high level then judges that power switch is in opening in time threshold;
It is once effective switching manipulation to switch to unlatching condition adjudgement by closed mode, all effective in record Preset Time
The frequency n of switching manipulation, temporary key is saved as by the frequency n.
In the method for described access wireless network, the step A includes step:
A1, controller initiate pairing request to node device, and request carries out pairing feature and exchanges;
A2, node device respond the pairing request after receiving the pairing request, and unique characteristics are returned back into controller.
In the method for described access wireless network, the step B includes step:
B1, controller inputting interface eject input frame, point out user input temporary key;
B2, the temporary key for receiving the on-off times generation by control node equipment that user is input into input frame.
In the method for described access wireless network, the step C includes step:
Controller and node device produce the first random number and the second random number respectively after C1, input temporary key, and according to the
First verification value of one preset algorithm computing controller and the second verification value of node device;
C2, controller and node device are exchanged with each other the first verification value and the second verification value;
C3, controller send to node device the first random number, and node device calculates control according to first nonce count
Device verification value, and it is whether consistent with the first verification value contrast that controller sends;
C4, when the controller verification value for calculating is consistent with the first verification value, node device sends to control the second random number
Device processed, controller calculates node device verification value according to second nonce count, and the second confirmation sent with node device
Whether value contrast is consistent;
C5, when the node device verification value for calculating is consistent with the second verification value, according to the temporary key, the first random number
Generation ephemeral keys are calculated with the second random number.
In the method for described access wireless network, the step D is specifically included:According to the ephemeral keys to controller
Link between node device is encrypted, and completes follow-up long term keys distribution and encryption data interaction.
A kind of system for accessing wireless network, it includes controller and node device, and the controller includes:
Pairing request module, exchanges for carrying out pairing feature with node device;
Prompting input module, for the temporary key for pointing out user input to be produced by the on-off times of control node equipment;
Matching authentication module, matching checking is carried out for the temporary key according to user input, and according to institute after being proved to be successful
State temporary key generation ephemeral keys;
Encryption connection module, for the encryption connection set up between controller and node device according to the ephemeral keys, completes
Encryption data is interacted.
In the system of described access wireless network, the node device includes:
Detection module is switched, the switching-on and switching-off state for detection node equipment simultaneously exports corresponding level;
Main control module, for the electrical level judging according to output and records the frequency n of switching manipulation, the frequency n is saved as and is faced
When key;
Energy-storage module, for being powered to node device when power switch is closed;
Wireless module, for carrying out data interaction with controller.
Compared to prior art, in the method and system of the access wireless network that the present invention is provided, the access wireless network
The method of network carries out pairing feature and exchanges by controller and node device;Prompting user is input into by controlling to save on the controller
The temporary key that the on-off times of point device are produced;The temporary key according to user input carries out matching checking afterwards, and is testing
Ephemeral keys are generated according to the temporary key after demonstrate,proving successfully;Afterwards controller and node device are set up according to the ephemeral keys
Between encryption connection, complete encryption data interaction, temporary key is produced by the on-off times of control node equipment, without increasing
Plus the production cost such as Quick Response Code or bar code, and temporary key randomness is strong, effectively increase in wireless network between smart machine
The security of data interaction.
Brief description of the drawings
The flow chart of the method for the access wireless network that Fig. 1 is provided for the present invention.
The flow chart of step S100 in the method for the access wireless network that Fig. 2 is provided for the present invention.
The circuit diagram of the switch detection module used in the method for the access wireless network that Fig. 3 is provided for the present invention.
It is the input voltage for switching detection module that is used in the method for access wireless network that Fig. 4 is provided for the present invention, defeated
Go out voltage and output level schematic diagram.
The flow chart of step S30 in the method for the access wireless network that Fig. 5 is provided for the present invention.
The structured flowchart of controller in the system of the access wireless network that Fig. 6 is provided for the present invention.
The structured flowchart of the system interior joint equipment of the access wireless network that Fig. 7 is provided for the present invention.
Specific embodiment
In view of generally needing to obtain temporary key by Quick Response Code in product packaging or bar code in the prior art, increase life
The shortcomings of into cost, it is an object of the invention to provide a kind of method and system for accessing wireless network, set by control node
Standby on-off times produce temporary key, without increasing the production costs such as Quick Response Code or bar code, and temporary key randomness it is strong,
Effectively increase the security of data interaction between smart machine in wireless network.
To make the purpose of the present invention, technical scheme and effect clearer, clear and definite, develop simultaneously embodiment pair referring to the drawings
The present invention is further described.It should be appreciated that specific embodiment described herein is only used to explain the present invention, it is not used to
Limit the present invention.
Fig. 1 is referred to, the method for the access wireless network that the present invention is provided comprises the following steps:
S10, controller carry out pairing feature and exchange with node device;
S20, prompting user are input into the temporary key produced by the on-off times of control node equipment on the controller;
S30, matching checking is carried out according to the temporary key of user input, and generated according to the temporary key after being proved to be successful
Ephemeral keys;
S40, the encryption connection set up between controller and node device according to the ephemeral keys, complete encryption data interaction.
In step S10, a controller and several intelligent node equipment are included in wireless network, when controller is detected
One new node device need to be added in network, then controller and node device carry out pairing feature and exchange, to exchange IO energy
Power, OOB authentication datas availability, certification demand, cipher key size demand and the transmission specific key that will be distributed.
Specifically, the step S10 includes step:
S11, controller initiate pairing request to node device, and request carries out pairing feature and exchanges;
S12, node device respond the pairing request after receiving the pairing request, and unique characteristics are returned back into controller.
When controller detects a new node device need to be added in network, controller is initiated to node device
Pairing_Request pairing requests, request pairing feature is exchanged, i.e., security feature is exchanged, including input/output(IO)Work(
Energy, OOB(Out-of-Band, band is outer)Data Labels position, binding mark(Bonding Flags)、MITM(Man-In-The-
Middle)Flag bit and cipher key size etc., node device respond the pairing request after receiving the pairing request, will
Unique characteristics are replied(pairing_Response)To controller, match characteristic and exchanged allowing the controller and node of connection
Equipment both sides learn mutual pairing characteristic, are easy to follow-up pairing to connect.
Further, the step S20 includes step:
S21, controller inputting interface eject input frame, point out user input temporary key;
S22, the temporary key for receiving the on-off times generation by control node equipment that user is input into input frame.
I.e. after controller and node device completion pairing feature are exchanged, will be ejected in the inputting interface of controller and be input into
Frame, to point out user input temporary key, user is input into input frame and is produced by the on-off times of advance control node equipment
Raw random temporary key, randomness is strong, improves the security of data interaction.
Because the temporary key is to be produced beforehand through the on-off times of control node equipment, therefore before step S10,
Or also include step after step S10, before step S20:
Continuously switch several times, is detected simultaneously in Preset Time according to the switching control instruction of user input for S100, node device
The frequency n of switching manipulation is recorded, the frequency n is saved as into temporary key.
The present invention is by the way that before user input temporary key, user is by controlling wireless intelligent network interior joint equipment
Power switch randomly generates a temporary key(TK), quickly continuously switch the node device several times in Preset Time,
High-speed switch node device 5 times for example in 10s, the high-speed switch node device produces the process of random temporary key can be
Any one stage in three phases performs, i.e. before step S11 or between step S11 and step S12 or step S12
Between step S21, now node device is detected and records the frequency n of switching manipulation, and the frequency n is saved as interim close
Key is used for follow-up checking and matches.
Specifically also referring to Fig. 2, the step S100 comprises the following steps:
S101, the power switch of node device are continuously switched several times in Preset Time;
S102, energy-storage module are powered when power switch is closed to node device;
S103, the switching-on and switching-off state of switch detection module detection node equipment simultaneously export corresponding level;
S104, the electrical level judging according to output simultaneously record the frequency n of switching manipulation, and the frequency n is saved as into temporary key.
Node device of the present invention quickly continuously switchs some according to the switching control instruction of user input in Preset Time
It is secondary, acted using switch detection module detection switch as shown in Figure 3, i.e., the switching-on and switching-off state of detection node equipment and export
Corresponding level, detailed process is that alternating current carries out rectification treatment output dc source by rectifier bridge, and the voltage of output is through undue
The Vs produced after piezoresistance first resistor R1 and second resistance R2 partial pressures is input into the in-phase input end of comparator, with anti-phase input
Hold the reference voltage Vref of input to be compared, high level is exported when Vs is more than Vref, otherwise export low level, therefore master control
Module is according to the electrical level judging of output and records the frequency n of switching manipulation, and the frequency n is saved as into temporary key afterwards, from
And produce the strong temporary key of randomness, it is preferable that when of short duration power switch is closed, supplied to node device by energy-storage module
Electricity, for example inductively or capacitively etc., it is to avoid the damage that continuous high-speed switch power supply is caused to node device.
Wherein, the step S104 is specifically included:
When the low level duration is exported more than very first time threshold value, judge that power switch is closed;When first
Output high level then judges that power switch is in opening in time threshold;
It is once effective switching manipulation to switch to unlatching condition adjudgement by closed mode, all effective in record Preset Time
The frequency n of switching manipulation, temporary key is saved as by the frequency n.
Be can be seen that with reference to Fig. 4, comparator is output as cycle level signal in the case of normal power supply, its cycle T rec is two
/ mono- ac period Tac, after power switch is closed, does not have alternating current to be input into, and comparator output is always low level,
If main control module detects the comparator output low level time more than very first time threshold value, represent now power switch and exist
Closed mode;If the output level for detecting comparator high level occurs in very first time threshold value, represent and now first open
Close and be in opening, it is once effective switching manipulation, main control module record to switch to unlatching condition adjudgement by closed mode
The frequency n of all effective switching manipulations, temporary key is saved as by the frequency n in Preset Time, is set by control node
Standby on-off times produce temporary key, without increasing the production costs such as Quick Response Code or bar code, and temporary key randomness it is strong,
Effectively increase the security of data interaction between smart machine in wireless network.
Further, also referring to Fig. 5, the step S30 includes step:
Controller and node device produce the first random number and the second random number respectively after S31, input temporary key, and according to the
First verification value of one preset algorithm computing controller and the second verification value of node device;
S32, controller and node device are exchanged with each other the first verification value and the second verification value;
S33, controller send to node device the first random number, and node device calculates control according to first nonce count
Device verification value, and it is whether consistent with the first verification value contrast that controller sends;
S34, when the controller verification value for calculating is consistent with the first verification value, node device sends to control the second random number
Device processed, controller calculates node device verification value according to second nonce count, and the second confirmation sent with node device
Whether value contrast is consistent;
S35, when the node device verification value for calculating is consistent with the second verification value, according to the temporary key, first random
Number and the second random number calculate generation ephemeral keys.
In the method for the access wireless network that i.e. present invention is provided, user have input temporary key(TK)To carry out afterwards
Matching checking, and ephemeral keys are generated according to the temporary key after being proved to be successful, detailed process is:Controller and node device
The first random number is produced respectively(Mrand)With the second random number(Srand), and respective confirmation is calculated according to the first preset algorithm
(confirm)Value, i.e. the first verification value of controller(Mconfirm)With the second verification value of node device(Sconfirm),
Confirm values are by temporary key(TK), the two random number Mrand/Srand, pairing request instruction(Pairing request
command), pairing response instruction(Pairing response command), device address type(device address
type)And device address(device address)Produced by the first preset algorithm, first preset algorithm can be confirmation
Value generating function(Specifically refer to the version of bluetooth core specification 4.2, volume 4, H parts, 2.2.3 chapters and sections), because it is existing
There is technology, be not described further herein;Controller and node device are exchanged with each other the first verification value and the second verification value afterwards;Control afterwards
The the first random number Mrand of itself is sent to node device by device processed, and node device calculates controller after receiving using the value
Mconfirm values, and be relatively consistent with the Mconfirm that foregoing controller sends, if unanimously, node device by itself
The second random number Srand be sent to controller, controller calculates the Sconfirm values of node device using the value after receiving,
And with the Sconfirm that preceding node equipment sends relatively be it is consistent, if it is same it is consistent if be proved to be successful, according to described interim
Key, the first random number and the second random number calculate generation ephemeral keys(STK), and notification controller encryption enabled, specific institute
Ephemeral keys are stated to be generated by key-function(Refer to the version of bluetooth core specification 4.2, volume 2, H parts, 2.2.4
Chapters and sections), because it is prior art, it is not described further herein.
After matching is proved to be successful and obtains ephemeral keys, you can in step s 40 according to the ephemeral keys to control
Link between device and node device is encrypted, and completes follow-up long term keys distribution and encryption data interaction, it is ensured that
Equipment carries out the security of data interaction in network.
The present invention correspondingly provides a kind of system for accessing wireless network, including controller and node device, such as Fig. 6 and Tu
Shown in 7, the controller includes pairing request module 11, prompting input module 12, matching authentication module 13 and encryption connection mould
Block 14, the pairing request module 11, prompting input module 12, matching authentication module 13 and encryption connection module 14 connect successively
Connect, wherein, the pairing request module 11 is exchanged for carrying out pairing feature with node device;The prompting input module 12 is used
In the temporary key that prompting user input is produced by the on-off times of control node equipment;The matching authentication module 13 is used for
Temporary key according to user input carries out matching checking, and short-term close according to temporary key generation after being proved to be successful
Key;The encryption connection module 14 is used for the encryption connection set up between controller and node device according to the ephemeral keys,
Complete encryption data interaction.Specifically refer to the corresponding embodiment of the above method.
The node device includes switch detection module 21, main control module 22, energy-storage module 23 and wireless module 24, described
Switch detection module 21 and energy-storage module 23 are all connected with main control module 22, and the main control module 22 is also connected with wireless module 24, its
In, the switch detection module 21 is used for the switching-on and switching-off state of detection node equipment and exports corresponding level;The master control mould
Block 22 is used for the electrical level judging according to output and records the frequency n of switching manipulation, and the frequency n is saved as into temporary key;Institute
Energy-storage module 23 is stated for being powered to node device when power switch is closed;The wireless module 24 is used to be carried out with controller
Data interaction, such as bluetooth or wifi etc..
Specifically, referring to Fig. 3, the switch detection module 21 includes rectifier bridge 211, first resistor R1, second
Resistance R2, the first power supply U1 and comparator A1, the input connection alternating voltage of the rectifier bridge 211, the rectifier bridge 211
Positive output end connects the in-phase input end of comparator A1 and one end of second resistance R2 by first resistor R1;First power supply
The inverting input of the positive pole connection comparator A1 of U1, the output end connection main control module 22 of the comparator A1;The rectification
The negative pole of the negative output terminal, the other end of second resistance R2 and the first power supply U1 of bridge 211 is grounded.Specifically refer to the above method
Corresponding embodiment.
To more fully understand the implementation process of the method for the access wireless network that the present invention is provided, below in conjunction with Fig. 1 to figure
5, data exchange process of the invention is described in detail for concrete application embodiment:
For example having a blue-tooth intelligence LED A need to add the blue-tooth intelligence network of mobile phone control, and pairing process is as follows:
1st, mobile phone initiates pairing_Request to LED A, and request pairing feature is exchanged;For exchanging IO abilities, OOB certifications
Availability of data, certification demand, cipher key size demand and the transmission specific key that will be distributed;
2nd, after LED A receives mobile phone pairing_Request, unique characteristics are replied(pairing_Response)To mobile phone;
3rd, mobile phone prompting user is input into temporary key in input frame;
3.1st, the power switch of high-speed switch LED A, the automatically action of power switch detection module detection switch and record switch
Frequency n(It should be noted that, the step can also be performed before step 1 or 2);
3.2nd, user is input into n and confirms in the temporary key input frame of mobile phone;
4th, mobile phone and LED A produce respective random number(Mrand and Srand)Afterwards, respective confirm values are calculated
(Mconfirm and Sconfirm), specific computation rule refers to above method embodiment;
5th, the Mrand of itself is issued LED A by mobile phone after both sides exchange respective confirm values, and LED A is utilized after receiving should
Value calculates the Mconfirm values of mobile phone, and is relatively consistent with the Mconfirm that previous mobile phone sends;
6th, the Srand of oneself is issued mobile phone by LED A, and mobile phone calculates the Sconfirm values of LED A using the value after receiving,
And with the Sconfirm that previous LED A sends relatively be consistent;
7th, ephemeral keys STK is generated according to TK, Mrand and Srand after the match is successful;
8th, link is encrypted with STK and completes follow-up long term keys(LTK)Distribution.
In sum, in the method and system of the access wireless network that the present invention is provided, the side for accessing wireless network
Method carries out pairing feature and exchanges by controller and node device;Prompting user is input into by control node equipment on the controller
On-off times produce temporary key;The temporary key according to user input carries out matching checking afterwards, and is being proved to be successful
Ephemeral keys are generated according to the temporary key afterwards;Set up between controller and node device according to the ephemeral keys afterwards
Encryption connection, completes encryption data interaction, temporary key is produced by the on-off times of control node equipment, without increasing two dimension
The production cost such as code or bar code, and temporary key randomness is strong, effectively increase data friendship between smart machine in wireless network
Mutual security.
It is understood that for those of ordinary skills, can be with technology according to the present invention scheme and its hair
Bright design is subject to equivalent or change, and all these changes or replacement should all belong to the guarantor of appended claims of the invention
Shield scope.
Claims (10)
1. it is a kind of access wireless network method, it is characterised in that comprise the following steps:
A, controller carry out pairing feature and exchange with node device;
B, prompting user are input into the temporary key produced by the on-off times of control node equipment on the controller;
C, matching checking is carried out according to the temporary key of user input, and generated according to the temporary key after being proved to be successful short
Phase key;
D, the encryption connection set up between controller and node device according to the ephemeral keys, complete encryption data interaction.
2. it is according to claim 1 access wireless network method, it is characterised in that it is before the step A or described
Also include step after step A, before step B:
Continuously switch several times, is detected and remembered in Preset Time according to the switching control instruction of user input for A0, node device
The frequency n of switching manipulation is recorded, the frequency n is saved as into temporary key.
3. the method for accessing wireless network according to claim 2, it is characterised in that the step A0 includes following step
Suddenly:
A01, the power switch of node device are continuously switched several times in Preset Time;
A02, energy-storage module are powered when power switch is closed to node device;
A03, the switching-on and switching-off state of switch detection module detection node equipment simultaneously export corresponding level;
A04, the electrical level judging according to output simultaneously record the frequency n of switching manipulation, and the frequency n is saved as into temporary key.
4. it is according to claim 3 access wireless network method, it is characterised in that the step A04 is specifically included:
When the low level duration is exported more than very first time threshold value, judge that power switch is closed;When first
Output high level then judges that power switch is in opening in time threshold;
It is once effective switching manipulation to switch to unlatching condition adjudgement by closed mode, all effective in record Preset Time
The frequency n of switching manipulation, temporary key is saved as by the frequency n.
5. it is according to claim 1 access wireless network method, it is characterised in that the step A include step:
A1, controller initiate pairing request to node device, and request carries out pairing feature and exchanges;
A2, node device respond the pairing request after receiving the pairing request, and unique characteristics are returned back into controller.
6. it is according to claim 1 access wireless network method, it is characterised in that the step B include step:
B1, controller inputting interface eject input frame, point out user input temporary key;
B2, the temporary key for receiving the on-off times generation by control node equipment that user is input into input frame.
7. it is according to claim 1 access wireless network method, it is characterised in that the step C include step:
Controller and node device produce the first random number and the second random number respectively after C1, input temporary key, and according to the
First verification value of one preset algorithm computing controller and the second verification value of node device;
C2, controller and node device are exchanged with each other the first verification value and the second verification value;
C3, controller send to node device the first random number, and node device calculates control according to first nonce count
Device verification value, and it is whether consistent with the first verification value contrast that controller sends;
C4, when the controller verification value for calculating is consistent with the first verification value, node device sends to control the second random number
Device processed, controller calculates node device verification value according to second nonce count, and the second confirmation sent with node device
Whether value contrast is consistent;
C5, when the node device verification value for calculating is consistent with the second verification value, according to the temporary key, the first random number
Generation ephemeral keys are calculated with the second random number.
8. it is according to claim 1 access wireless network method, it is characterised in that the step D is specifically included:According to
The ephemeral keys are encrypted to the link between controller and node device, and complete follow-up long term keys distribution and
Encryption data is interacted.
9. it is a kind of access wireless network system, it is characterised in that including controller and node device, the controller includes:
Pairing request module, exchanges for carrying out pairing feature with node device;
Prompting input module, for the temporary key for pointing out user input to be produced by the on-off times of control node equipment;
Matching authentication module, matching checking is carried out for the temporary key according to user input, and according to institute after being proved to be successful
State temporary key generation ephemeral keys;
Encryption connection module, for the encryption connection set up between controller and node device according to the ephemeral keys, completes
Encryption data is interacted.
10. it is according to claim 9 access wireless network system, it is characterised in that the node device includes:
Detection module is switched, the switching-on and switching-off state for detection node equipment simultaneously exports corresponding level;
Main control module, for the electrical level judging according to output and records the frequency n of switching manipulation, the frequency n is saved as and is faced
When key;
Energy-storage module, for being powered to node device when power switch is closed;
Wireless module, for carrying out data interaction with controller.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710221072.2A CN106937406B (en) | 2017-04-06 | 2017-04-06 | Method and system for accessing wireless network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710221072.2A CN106937406B (en) | 2017-04-06 | 2017-04-06 | Method and system for accessing wireless network |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106937406A true CN106937406A (en) | 2017-07-07 |
CN106937406B CN106937406B (en) | 2019-12-17 |
Family
ID=59426230
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710221072.2A Active CN106937406B (en) | 2017-04-06 | 2017-04-06 | Method and system for accessing wireless network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106937406B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108833607A (en) * | 2018-06-12 | 2018-11-16 | 腾讯科技(深圳)有限公司 | Physical address acquisition methods, device and readable medium |
CN109714765A (en) * | 2019-01-25 | 2019-05-03 | 欧普照明股份有限公司 | A kind of matching method |
CN111263360A (en) * | 2020-03-17 | 2020-06-09 | 中国工程物理研究院机械制造工艺研究所 | Wireless encryption device and method for protecting variable mechanical authentication password by adopting public key |
WO2021258376A1 (en) * | 2020-06-24 | 2021-12-30 | Oppo广东移动通信有限公司 | Wireless communication method and device |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070252675A1 (en) * | 2004-09-24 | 2007-11-01 | David Lamar | Electronically enabling device remotely |
CN101118662A (en) * | 2006-08-02 | 2008-02-06 | 雅马哈发动机株式会社 | Vehicle control device and vehicle provided with the same |
US20080224819A1 (en) * | 2007-03-16 | 2008-09-18 | The Chamberlain Group, Inc. | Multiple barrier operator system |
CN202503698U (en) * | 2012-01-31 | 2012-10-24 | 雷通科技发展有限公司 | Intelligent LED lights |
CN104533185A (en) * | 2015-01-23 | 2015-04-22 | 魏初舜 | Collecting system based on code case |
CN104955241A (en) * | 2015-07-08 | 2015-09-30 | 乐鑫信息科技(上海)有限公司 | Method and device for pairing lighting equipment and switches without wires in IoT (Internet of Things) |
CN105303118A (en) * | 2015-11-26 | 2016-02-03 | 上海易码信息科技有限公司 | Encryption method and encryption device used for wearable device |
CN105847038A (en) * | 2016-03-17 | 2016-08-10 | 深圳市彩易生活科技有限公司 | Wireless communication module, reset method for terminal equipment and control system |
CN105844133A (en) * | 2016-03-18 | 2016-08-10 | 广东欧珀移动通信有限公司 | Application opening method and system |
CN106143412A (en) * | 2015-03-26 | 2016-11-23 | 比亚迪股份有限公司 | Automobile, the wireless key system of automobile and control method thereof |
-
2017
- 2017-04-06 CN CN201710221072.2A patent/CN106937406B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070252675A1 (en) * | 2004-09-24 | 2007-11-01 | David Lamar | Electronically enabling device remotely |
CN101118662A (en) * | 2006-08-02 | 2008-02-06 | 雅马哈发动机株式会社 | Vehicle control device and vehicle provided with the same |
US20080224819A1 (en) * | 2007-03-16 | 2008-09-18 | The Chamberlain Group, Inc. | Multiple barrier operator system |
CN202503698U (en) * | 2012-01-31 | 2012-10-24 | 雷通科技发展有限公司 | Intelligent LED lights |
CN104533185A (en) * | 2015-01-23 | 2015-04-22 | 魏初舜 | Collecting system based on code case |
CN106143412A (en) * | 2015-03-26 | 2016-11-23 | 比亚迪股份有限公司 | Automobile, the wireless key system of automobile and control method thereof |
CN104955241A (en) * | 2015-07-08 | 2015-09-30 | 乐鑫信息科技(上海)有限公司 | Method and device for pairing lighting equipment and switches without wires in IoT (Internet of Things) |
CN105303118A (en) * | 2015-11-26 | 2016-02-03 | 上海易码信息科技有限公司 | Encryption method and encryption device used for wearable device |
CN105847038A (en) * | 2016-03-17 | 2016-08-10 | 深圳市彩易生活科技有限公司 | Wireless communication module, reset method for terminal equipment and control system |
CN105844133A (en) * | 2016-03-18 | 2016-08-10 | 广东欧珀移动通信有限公司 | Application opening method and system |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108833607A (en) * | 2018-06-12 | 2018-11-16 | 腾讯科技(深圳)有限公司 | Physical address acquisition methods, device and readable medium |
CN109714765A (en) * | 2019-01-25 | 2019-05-03 | 欧普照明股份有限公司 | A kind of matching method |
CN111263360A (en) * | 2020-03-17 | 2020-06-09 | 中国工程物理研究院机械制造工艺研究所 | Wireless encryption device and method for protecting variable mechanical authentication password by adopting public key |
WO2021258376A1 (en) * | 2020-06-24 | 2021-12-30 | Oppo广东移动通信有限公司 | Wireless communication method and device |
Also Published As
Publication number | Publication date |
---|---|
CN106937406B (en) | 2019-12-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106937406A (en) | A kind of method and system for accessing wireless network | |
EP2829095B1 (en) | Network security configuration using short-range wireless communication | |
CN103929748A (en) | Internet of things wireless terminal, configuration method thereof and wireless network access point | |
CN103095460B (en) | Intelligent card safety communication method | |
CN108270554B (en) | Terminal pairing method and system | |
CN107769914A (en) | Protect the method and the network equipment of data transmission security | |
CN104486759A (en) | Method accessing wireless network without obstacle | |
CN103838988B (en) | Information safety protecting method and device | |
CN108768628B (en) | Equipment end encryption method, device, system and gateway | |
CN107483184A (en) | Battery management method, equipment, battery, article and system | |
CN105681032A (en) | Key storage method and device as well as key management method and device | |
CN104184857A (en) | Intelligent separated SIM card clamping base device and communication method | |
CN103476028A (en) | NAS (Non Access Stratum) message treatment method and device during rollover of NAS COUNT | |
CN105376059A (en) | Method and system for performing application signature based on electronic key | |
CN104159259A (en) | A wireless communication method and a wireless communication apparatus | |
CN106465044A (en) | Wireless power transfer with improved device identification and signaling link security | |
CN115225339B (en) | Safe access and data transmission method and system for sensing terminal of power transmission Internet of things | |
CN109561413A (en) | A kind of the bluetooth authentication authorization method and authoring system of BLE equipment | |
CN104244373B (en) | A kind of method that wireless terminal adds wireless network | |
EP2863578B1 (en) | Network device and authentication thereof and key management method | |
CN103702323A (en) | Wireless information security equipment system and method | |
CN105491553A (en) | Virtual SIM/USIM card management method | |
CN102158856A (en) | Mobile terminal identification code authentication system and method, server and terminal | |
CN103441854A (en) | Link protection method and system | |
CN106411513B (en) | Cryptographic key negotiation method and device in local area network communication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |